ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Noma Security is the agentic AI security platform giving enterprise organizations the confidence to rapidly build AI applications and adopt AI agents at scale. Noma Security uniquely provides cybersecurity teams with control of AI risk through continuous AI discovery and inventory, AI supply chain security, AI red teaming, and AI runtime protection to ensure compliance and risk mitigation. Backed by Ballistic Ventures, Glilot Capital, Cyber Club London, Databricks Ventures and SVCI, Noma Security is widely adopted by Fortune 500 customers and has been recognized by Gartner as a leading AI TRiSM solution.

Noma Security A.I CyberSecurity Scoring

Noma Security

Company Details

Linkedin ID:

noma-security

Employees number:

86

Number of followers:

6,908

NAICS:

541514

Industry Type:

Computer and Network Security

Homepage:

noma.security

IP Addresses:

0

Company ID:

NOM_1073643

Scan Status:

In-progress

AI scoreNoma Security Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/noma-security.jpeg
Noma Security Computer and Network Security
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreNoma Security Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/noma-security.jpeg
Noma Security Computer and Network Security
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Noma Security Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Noma Security: Google Fixes Gemini Enterprise Flaw That Exposed Corporate DataVulnerability85412/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: **Google Patches Zero-Click Vulnerability in Gemini Enterprise Exposing Corporate Data** In June 2025, security researchers at **Noma Security** uncovered a critical zero-click vulnerability in **Google Gemini Enterprise**, dubbed *GeminiJack*, which could enable attackers to exfiltrate sensitive corporate data without user interaction. The flaw, reported to Google the same day, affected **Gemini Enterprise**—Google’s suite of AI-powered workplace tools—and **Vertex AI Search**, a Google Cloud platform for AI-driven search and recommendations. The vulnerability stemmed from an **indirect prompt injection** weakness in Gemini’s **Retrieval-Augmented Generation (RAG)** architecture, which allows the AI to query across multiple Google Workspace data sources (Gmail, Google Docs, Calendar, etc.). Attackers could embed malicious instructions in seemingly benign documents, emails, or calendar events. When a legitimate employee performed a routine search, the AI would unknowingly process these instructions, scan authorized Workspace data for sensitive terms, and transmit the results to an attacker-controlled server via an external image URL—all while bypassing traditional security controls. The attack required no user interaction, making it particularly stealthy. Google confirmed the report in **August 2025** and collaborated with Noma Security to remediate the issue. By December, Google had deployed updates that **separated Vertex AI Search from Gemini Enterprise**, eliminating shared LLM workflows and RAG capabilities. However, Noma Security warned that such vulnerabilities may persist as AI systems gain broader access to corporate data, outpacing the detection capabilities of conventional security tools. The **UK’s National Cyber Security Centre (NCSC)** has since released guidance to help organizations mitigate prompt injection risks, underscoring the growing threat posed by AI-driven data exfiltration. The incident highlights the expanding attack surface introduced by corporate AI adoption, where a single flaw can expose vast amounts of sensitive information.

Noma Security: Google Fixes Gemini Enterprise Flaw That Exposed Corporate Data
Vulnerability
Severity: 85
Impact: 4
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: **Google Patches Zero-Click Vulnerability in Gemini Enterprise Exposing Corporate Data** In June 2025, security researchers at **Noma Security** uncovered a critical zero-click vulnerability in **Google Gemini Enterprise**, dubbed *GeminiJack*, which could enable attackers to exfiltrate sensitive corporate data without user interaction. The flaw, reported to Google the same day, affected **Gemini Enterprise**—Google’s suite of AI-powered workplace tools—and **Vertex AI Search**, a Google Cloud platform for AI-driven search and recommendations. The vulnerability stemmed from an **indirect prompt injection** weakness in Gemini’s **Retrieval-Augmented Generation (RAG)** architecture, which allows the AI to query across multiple Google Workspace data sources (Gmail, Google Docs, Calendar, etc.). Attackers could embed malicious instructions in seemingly benign documents, emails, or calendar events. When a legitimate employee performed a routine search, the AI would unknowingly process these instructions, scan authorized Workspace data for sensitive terms, and transmit the results to an attacker-controlled server via an external image URL—all while bypassing traditional security controls. The attack required no user interaction, making it particularly stealthy. Google confirmed the report in **August 2025** and collaborated with Noma Security to remediate the issue. By December, Google had deployed updates that **separated Vertex AI Search from Gemini Enterprise**, eliminating shared LLM workflows and RAG capabilities. However, Noma Security warned that such vulnerabilities may persist as AI systems gain broader access to corporate data, outpacing the detection capabilities of conventional security tools. The **UK’s National Cyber Security Centre (NCSC)** has since released guidance to help organizations mitigate prompt injection risks, underscoring the growing threat posed by AI-driven data exfiltration. The incident highlights the expanding attack surface introduced by corporate AI adoption, where a single flaw can expose vast amounts of sensitive information.

Ailogo

Noma Security Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Noma Security

Incidents vs Computer and Network Security Industry Average (This Year)

Noma Security has 53.85% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Noma Security has 29.87% more incidents than the average of all companies with at least one recorded incident.

Incident Types Noma Security vs Computer and Network Security Industry Avg (This Year)

Noma Security reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Noma Security (X = Date, Y = Severity)

Noma Security cyber incidents detection timeline including parent company and subsidiaries

Noma Security Company Subsidiaries

SubsidiaryImage

Noma Security is the agentic AI security platform giving enterprise organizations the confidence to rapidly build AI applications and adopt AI agents at scale. Noma Security uniquely provides cybersecurity teams with control of AI risk through continuous AI discovery and inventory, AI supply chain security, AI red teaming, and AI runtime protection to ensure compliance and risk mitigation. Backed by Ballistic Ventures, Glilot Capital, Cyber Club London, Databricks Ventures and SVCI, Noma Security is widely adopted by Fortune 500 customers and has been recognized by Gartner as a leading AI TRiSM solution.

Loading...
similarCompanies

Noma Security Similar Companies

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

NETWORK-SECURITY-SOLUTIONS

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

newsone

Noma Security CyberSecurity News

December 09, 2025 03:09 PM
GeminiJack Vulnerability Exposes Google AI Security Flaw

The Noma Security report says the flaw was not a conventional bug but an architectural weakness in how the AI's Retrieval-Augmented...

December 05, 2025 01:00 PM
The 10 Hottest Cybersecurity Startups Of 2025

Our picks for the hottest cybersecurity startups of 2025 include companies in key categories such as AI security and agentic-powered cyber...

October 17, 2025 07:00 AM
Can Traditional CIOs and CISOs Handle AI Cybersecurity?

As AWS hires a new VP to address rising AI challenges in cybersecurity, IT leaders are reckoning with a landscape that requires new skills.

October 09, 2025 07:00 AM
10 Hot AI Security Startups To Know In 2025

CRN's list of the hottest AI security startups to know in 2025 includes early-stage vendors bringing new ways to secure GenAI-powered...

October 07, 2025 07:00 AM
Discover 3 cybersecurity platforms advancing predictive intelligence, AI governance, and open source remediation on .Security domains

In today's digital landscape, cybersecurity platforms utilizing .Security domains are working to address the growing complexity of online...

September 26, 2025 07:00 AM
Cyber Security Headlines Week in Review: Jaguar Land Rover attack, indirect prompt injections, card farms in NYC

This week's Cyber Security Headlines – Week in Review is hosted by David Spark with guests Brett Conlon, CISO, American Century Investments,...

September 26, 2025 07:00 AM
Critical Flaw in Salesforce AI Agent Enables Data Exfiltration

Salesforce customers have been urged to patch immediately after cybersecurity researchers at Noma Labs uncovered a severe vulnerability.

September 25, 2025 07:00 AM
Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence...

September 25, 2025 07:00 AM
Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

A critical vulnerability chain in Salesforce's Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Noma Security CyberSecurity History Information

Official Website of Noma Security

The official website of Noma Security is https://noma.security.

Noma Security’s AI-Generated Cybersecurity Score

According to Rankiteo, Noma Security’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.

How many security badges does Noma Security’ have ?

According to Rankiteo, Noma Security currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Noma Security have SOC 2 Type 1 certification ?

According to Rankiteo, Noma Security is not certified under SOC 2 Type 1.

Does Noma Security have SOC 2 Type 2 certification ?

According to Rankiteo, Noma Security does not hold a SOC 2 Type 2 certification.

Does Noma Security comply with GDPR ?

According to Rankiteo, Noma Security is not listed as GDPR compliant.

Does Noma Security have PCI DSS certification ?

According to Rankiteo, Noma Security does not currently maintain PCI DSS compliance.

Does Noma Security comply with HIPAA ?

According to Rankiteo, Noma Security is not compliant with HIPAA regulations.

Does Noma Security have ISO 27001 certification ?

According to Rankiteo,Noma Security is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Noma Security

Noma Security operates primarily in the Computer and Network Security industry.

Number of Employees at Noma Security

Noma Security employs approximately 86 people worldwide.

Subsidiaries Owned by Noma Security

Noma Security presently has no subsidiaries across any sectors.

Noma Security’s LinkedIn Followers

Noma Security’s official LinkedIn profile has approximately 6,908 followers.

NAICS Classification of Noma Security

Noma Security is classified under the NAICS code 541514, which corresponds to Others.

Noma Security’s Presence on Crunchbase

Yes, Noma Security has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/noma-94e0.

Noma Security’s Presence on LinkedIn

Yes, Noma Security maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/noma-security.

Cybersecurity Incidents Involving Noma Security

As of December 13, 2025, Rankiteo reports that Noma Security has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Noma Security has an estimated 3,083 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Noma Security ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Noma Security detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with noma security (researchers), and containment measures with separation of vertex ai search from gemini enterprise, changes to rag workflows, and remediation measures with updates to how gemini enterprise and vertex ai search interact with retrieval and indexing systems..

Incident Details

Can you provide details on each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection

Title: GeminiJack: Zero-Click Vulnerability in Google Gemini Enterprise Leading to Corporate Data Leaks

Description: Google patched a zero-click vulnerability in Gemini Enterprise that could lead to corporate data leaks. The flaw, dubbed ‘GeminiJack’, is an architectural weakness in Google Gemini Enterprise and Vertex AI Search, allowing indirect prompt injection attacks to exfiltrate sensitive corporate information without user interaction or triggering security controls. The attack involves embedding hidden instructions in documents, emails, or calendar events, which Gemini Enterprise processes during routine searches, leading to data exfiltration via external image URLs.

Date Detected: 2025-06

Date Publicly Disclosed: 2025-12-08

Type: Zero-Click Vulnerability, Indirect Prompt Injection

Attack Vector: Malicious instructions embedded in Google Workspace documents (Google Docs, Gmail, Google Calendar)

Vulnerability Exploited: Architectural weakness in Google Gemini Enterprise and Vertex AI Search (RAG-based trust boundary exploitation)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Data Compromised: Sensitive corporate information

Systems Affected: Google Gemini Enterprise, Vertex AI Search, Google Workspace (Gmail, Google Docs, Google Calendar)

Operational Impact: Potential unauthorized data exfiltration without detection by traditional security tools

Brand Reputation Impact: Potential reputational damage due to data leaks

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive corporate information.

Which entities were affected by each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Entity Name: Google

Entity Type: Technology Company

Industry: Technology, Cloud Services, AI

Location: Global

Size: Large Enterprise

Customers Affected: Corporate users of Google Gemini Enterprise and Vertex AI Search

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Third Party Assistance: Noma Security (researchers)

Containment Measures: Separation of Vertex AI Search from Gemini Enterprise, changes to RAG workflows

Remediation Measures: Updates to how Gemini Enterprise and Vertex AI Search interact with retrieval and indexing systems

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Noma Security (researchers).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Type of Data Compromised: Sensitive corporate information

Sensitivity of Data: High (corporate data)

Data Exfiltration: Yes (via external image URLs)

File Types Exposed: Google Docs, Gmail, Google Calendar events

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Updates to how Gemini Enterprise and Vertex AI Search interact with retrieval and indexing systems.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by separation of vertex ai search from gemini enterprise and changes to rag workflows.

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Lessons Learned: Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.

What recommendations were made to prevent future incidents ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Recommendations: Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research, (4) Follow NCSC guidance on mitigating prompt injection attacks.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research and (4) Follow NCSC guidance on mitigating prompt injection attacks..

References

Where can I find more information about each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Source: Noma Security Report on GeminiJack

Date Accessed: 2025-12-08

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Source: UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Noma Security Report on GeminiJackDate Accessed: 2025-12-08, and Source: UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Investigation Status: Resolved (patches deployed)

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Zero-Click Vulnerability, Indirect Prompt Injection NOM1765375786

Root Causes: Trust boundary exploitation in RAG architecture, lack of detection for AI-driven exfiltration

Corrective Actions: Separation of Vertex AI Search from Gemini Enterprise, updates to RAG workflows, changes to retrieval and indexing systems

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Noma Security (researchers).

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Separation of Vertex AI Search from Gemini Enterprise, updates to RAG workflows, changes to retrieval and indexing systems.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-06.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-08.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive corporate information.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Noma Security (researchers).

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Separation of Vertex AI Search from Gemini Enterprise and changes to RAG workflows.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive corporate information.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Traditional security controls (perimeter defenses, endpoint protection, DLP) are insufficient to detect AI-driven exfiltration. Organizations must implement robust monitoring and consider trust boundaries when deploying AI systems with access to sensitive data.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Organizations should: (1) Carefully configure RAG system data sources, (2) Implement enhanced monitoring for AI-driven data access, (3) Stay informed about emerging AI security research and (4) Follow NCSC guidance on mitigating prompt injection attacks..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Noma Security Report on GeminiJack and UK National Cyber Security Centre (NCSC) Guidance on Prompt Injection Attacks.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (patches deployed).

cve

Latest Global CVEs (Not Company-Specific)

Description

PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F handlers allow a specially crafted disc image or ELF to cause an out-of-bounds read from emulator memory. Because the offset and size is controlled through MG header fields, a specially crafted ELF can read data beyond the bounds of mg_buffer and have it reflected back into emulated memory. This issue is fixed in version 2.5.378.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=zone. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=noma-security' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge